iTnews
  • Home
  • News
  • Technology
  • Security

Two Office flaws found in Month of ActiveX bugs

By Dan Kaplan on May 3, 2007 9:58AM
Two Office flaws found in Month of ActiveX bugs

A hacker known as shinnai kicked off his "Month of ActiveX Bugs" (MoAxB) project with a bang by exposing a number of severe vulnerabilities affecting OCX controls in Microsoft Office.

Tracking firm Secunia rated the flaws as "highly critical," saying successful exploitation could permit malicious code execution.

The bugs residing in the PowerPoint Viewer, used to display presentations, are caused by boundary errors in the viewer’s ActiveX control that can lead to stack-based buffer overflows, according a Secunia advisory. The flaws are located in the program, PowerPointViewer.ocx, and affect version 3.1.0.3.

OCX is the former name for ActiveX controls.

The other flaws impact Excel Viewer and are similarly caused by boundary errors in the Excel Viewer ActiveX control, specifically ExcelViewer.ocx, Secunia said in a separate advisory. If taken advantage of, the same result can occur. They are confirmed in version 3.2.0.5.

shinnai said today on the moAxB blog that "this component allow(s) you to visualize, create and modify XLS files."

"Some methods are unable to handle exceptional conditions, and this cause(s) the crash of the application that use(s) this component."

The hacker said on Milw0rm today that the exploit has been tested on Windows XP Professional with Service Pack 2 and Internet Explorer 7 installed.

Users are encouraged to set the kill-bit for the affected ActiveX controls, according to Secunia. The kill-bit feature prevents ActiveX execution in a user’s web browser.

Microsoft said it is monitoring the MoAxB project, another effort by the hacking community to expose a month's worth of vulnerabilities in a variety of computer components and applications.

"As always, the Microsoft Security Response Center(MSRC) will stand ready to mobilise its teams to investigate, fix and learn from any vulnerabilities discovered through the project, and the company will take appropriate action to protect its customers, as needed," a company spokesman told SCMagazine.com.

He added that Microsoft prefers when researchers report flaws directly to the vendor to "ensure that customers receive comprehensive, high-quality updates for security vulnerabilities without exposure to malicious attackers while the update is being developed."

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
activexbeginsbugsflawsmonthofofficeprojectsecuritytwowith

Partner Content

How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Dan Kaplan
May 3 2007
9:58AM
0 Comments

Related Articles

  • New ActiveX Windows zero-day exploited: Microsoft alert
  • Microsoft patches exploited 'Follina' remote code exec bug
  • Apple defeats class action over Meltdown, Spectre vulns
  • Click Studios revokes digital cert used by 'Follina' dropped malware
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Australian court finds insurer not liable for ransomware clean-up costs

Australian court finds insurer not liable for ransomware clean-up costs

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

ADHA extends Accenture's My Health Record support deal for $100m

ADHA extends Accenture's My Health Record support deal for $100m

Digital Nation

COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.